BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Antisyphon Training - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://www.antisyphontraining.com
X-WR-CALDESC:Events for Antisyphon Training
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20260308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20261101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20270314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20271107T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260114T120000
DTEND;TZID=America/New_York:20260114T130000
DTSTAMP:20260418T113458
CREATED:20251211T072758Z
LAST-MODIFIED:20251211T072801Z
UID:10000863-1768392000-1768395600@www.antisyphontraining.com
SUMMARY:Anti-Cast: Threat Hunting Malware Communication over DNS with Faan Rossouw
DESCRIPTION:Are attackers hiding in your DNS traffic right now? \n\n\n\nJoin instructor Faan Rossouw for a free one-hour training on hunting malware that uses DNS as a covert communication channel. \n\n\n\nC2 frameworks\, RATs\, and backdoors frequently exploit DNS to stay hidden – sometimes for months. High-profile attacks like SolarWinds’ Sunburst demonstrate just how devastating undetected DNS exfiltration can be. \n\n\n\nThis Antisyphon Anti-Cast focuses on behavior-based threat hunting techniques that go beyond signatures to uncover suspicious DNS activity attackers think they’ve hidden. \n\n\n\nYou’ll learn how to: \n\n\n\n\nRecognize network artifacts that DNS tunneling produces\n\n\n\nIdentify anomalies in DNS record types that signal malicious use\n\n\n\nLeverage open-source tools like Zeek\, RITA\, and Sysmon to detect malware abusing DNS\n\n\n\nBuild detection strategies that make it very hard for DNS-based threats to remain hidden\n\n\n\n\nIf you’re ready to stop trusting DNS and start verifying it\, this session will give you the practical skills to hunt what’s lurking in your network. \n\n\n\n\nRegister Here\n\n\n\n\nJoin us for PreShow Banter™ at 11:30 AM ETChat with your fellow attendees in the BHIS Discord server:https://discord.gg/bhis in the #🔴live-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nDon’t forget to check out our Course Catalog for our upcoming free and affordable cybersecurity training! \n\n\n\n 
URL:https://www.antisyphontraining.com/event/anti-cast-threat-hunting-malware-communication-over-dns-with-faan-rossouw/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/webp:https://www.antisyphontraining.com/wp-content/uploads/2025/12/maxresdefault_live-1.webp
END:VEVENT
END:VCALENDAR